Intelligence and Complexity Theory 099

Intelligence and Complexity Theory *
099
Mircea MOCANU, PhD**
The present security environment displays a wide variety of challanges
and sofisticated risks and threats relevant in the field of global security. In
Clausewitzian view, these features underline the uncertainty of the security
environment and an increase in intensity for the risk management activities,
where the intelligence domain contributes significantly. This contribution
reveals the open system characteristics of intelligence, which allows this
activity to be approached from the perspective of system theory.
In this context, the whole risk management problem can also be
considered in terms of the complexity theory, and several concepts of this
scientific discipline are relevant for understanding the role of intelligence and
for improving intelligence support in risk management. Among these, the
concept of «surprise» stands out because of its consequences upon stability
and security at both global and national level.
Key words: intelligence, complexity theory, fractal, surprise, warning,
open system, risk management, operational planning.
1. The increased complexity of the present security environment 1
Comparing with the Cold War times, when the security environment was
conveniently described by the posture of the force structures maintained by the
nations, the present and the future display an eclectic content of the international
security, including diverse components (economic-financial, cultural-religious,
sanitary-epidemiologic, environmental, informational). The economic and
financial crisis triggered in 2008 and agravated in Europe by the case of Greece,
starting with 2011, is already a strong argument for this change.
*
This paper elaborates on sections of Mircea Mocanu, A Novel Vision on the Intelligence Cycle in the
Conditions of the Network Centric Warfare, PhD thesis defended at National Defence University "Carol I",
Bucharest, July 6, 2013.
**
Col (ret) Mircea Mocanu, BE, PhD, has worked as head of Analysis, Military Intelligence, Ministry of
National Defence of Romania, and head Production Branch, IMS INT, NATO HQ, Bruxelles, Belgium. E-mail:
[email protected].
1
This section uses parts of Mircea Mocanu and Ilie Botoş, Long Term Analysis and the Multiple Future Concept,
presented at "Power Balance and Security Environment" conference, Centre for Strategic, Defence and Security
Studies, National Defence University Publishing House, Bucharest, November 17-18, 2011, vol II, pp. 33 - 46.
Among the above mentioned components, the economy stands out as the
most relevant for its impact on the security environment. In that respect, Stephen
Flanagan notices that "the potential of economic globalization to wreak great
turmoil rapidly is becoming more evident"2, and Richard Kugler states that "the
coming era likely will be one in which economics and security share center stage in
determining how the World evolves"3.
An example proving the value of considering points of view pertaining to
areas non-specific to security is the annual study published each January by the
World Economic Forum in Geneva (WEF)4. In the 2011 issue, WEF identifies
35 risk factors inflicting upon the World economy and discusses their likelihood
and economic impact. In the 2012 Global Risks Report, WEF presents the
evolving perception of these risks, which indicates the growth in the likelihood
and impact of the financial-economic risks. The 2013 Report points out to the
dynamics of the risks compared to 2012, which adds value to the estimate. In
2014, the WEF Report underlines the systemic and interdependent nature of the
main 31 global risks. Global conflicts are rated as having among the most severe
economic impacts, along with financial crises and climate change. However,
they have a rather low likelihood, compared to many other risks, among which
failure of global governance, organized crime, terrorism, corruption, migration,
and failed states have a significant impact upon the security environment. In the
2015 Report though, interstate conflicts are considered instead of global
conflicts, probably due to the crisis in Ukraine. In January 2015, conflicts are
assessed very high in both probability and impact, followed closely by water
crises, failure of adaptation to climate change, and unemployment.
2
Stephen Flanagan, Meeting the Challenges of the Global Century, in Richard L. Kugler and Ellen L. Frost
(coord.), The Global Century: Globalization and National Security, Institute for National Strategic Studies /
National Defense University, Washington, DC, 2001, p. 11.
3
Richard L. Kugler, Controlling Chaos: New Axial Strategic Principles, in Richard Kugler and Ellen Frost,
Op.cit., p. 75.
4
* * *, Global Risks Report 2011, World Economic Forum, p. 3, accessed at 14.10 2011, Global Risks Report
2012, 22.01.2012, pp. 4 - 6, accessed at 27.01.2012, Global Risks Report 2013, 07.01.2013, pp. 4 - 5, 45 - 54,
accessed at 17.01.2013, Global Risks Report 2014, 16.01.2014, pp. 9 - 10, accessed at 19.01.2014, and Global
Risks Report 2015, p. 3, accessed at 30.01 2015, all published at www.weforum.org/reports.
Consequently, there is a growing entropy in international security
developments, which underlines the complexity of today's security environment,
considering complexity in its most general meaning. An increase in the
complexity of the very security structures can also be noticed, since "complexity
is not just in the problem - looking for terrorists or WMD in Iraq - but in the
organization doing the looking" 5.
2. Intelligence system as open system 6
The main meaning of intelligence support to military decisionmakers
places military intelligence as a sub-system of the superior system, the decisionmaking realm, which includes the commanding officer, his staff, the upper
bodies of the National Defence Ministry or other organizations of the Defence,
Law Enforcement and National Security System. So, intelligence support acts
inside another function of security / military, namely the function of risk management or operational planning, respectively: "it is crucial to recognize that
warning [as a function of intelligence] is one piece of a larger risk management
system"7. In the same time, the practical destination of intelligence products,
namely the integration of «actionable» intelligence into decision and concrete
action casts more light upon the relations between intelligence activities and the
realities of the security environment, military organization or operational situation.
Between the decisionmaking system, performing risk management, and
the intelligence sub-system, transfers of all systemic components are conducted:
resource transfers (material, energy, personell), information transfers and
suprastructure transfers (rules, directions, performance reports). The major
5
Paul Bracken, How to Build A Warning System, in Paul Bracken, Ian Bremmer and David Gordon, Managing
Strategic Surprise. Lessons from Risk Management and Risk Assessment, Cambridge University Press,
Cambridge, UK, 2008, p. 23.
6
This section uses parts of Mircea Mocanu, Military Intelligence as Open System, presented at the interntional
scientific conference Strategies XXI: "The Complexity and Dynamism of the Security Environment", Centre for
Strategic, Defence and Security Studies, National Defence University Publishing House, Bucharest, November 21-22,
2013, vol II, pp. 276 - 285.
7
Paul Bracken, Op.cit., How to Build A Warning System, in Paul Bracken, Ian Bremmer and David Gordon, Op.
cit., p. 42.
interest interaction - the information exchange - belongs to the general
information flow represented by the classic model of the intelligence cycle,
which includes the phases of Direction - Collection - Analysis - Dissemination.
The interaction between the intelligence structure (J2) and Command and
Control (C2) / the decision-making domain of the security or military system is
basically conducted through two points of the intelligence cycle. One is the
point allowing the transfer of intelligence requirement and beneficiary feed-back
towards J2. The second point is dissemination itself, which marks the delivery of
the intelligence product from J2 to the decisionmakers. These two moments of
the intelligence work are considered to be the most tricky precisely on the
grounds that these «gates» are the very contact points between the intelligence
subsystem and the C2 system, they are not internal links inside one system.
The two «gates» of the intelligence cycle marking the point of entry for
the intelligence requirements and the point of exit for the intelligence products
from the intelligence structures materialize the fact that the intelligence structure
is an open system. So, the conceptual model named intelligence cycle, which
describes the intelligence activity, defines the intelligence flow which crosses
both the intelligence structures and compartments of the beneficiary, which do
not belong to intelligence organisations. Consequently, the beneficiary - actor of
the decisionmaking / C2 system, not belonging to J2 - is, however, integral part
of the intelligence cycle.
The communication gates towards the C2 / risk management superior
system also clarify other two relations between the two systems:
- on one hand, they reveal the mechanism of transfering the Clausewitzian
friction within the operational environment or - writ large - within the security
environment8. Thus, the intelligence support provided by J2 as open system sets
the core role of intelligence as a tool to control the Clausewitzian friction of the
8
Barry Watts argues the persistance of Clausewitzian uncertainty in the conditions of the Information Age in his
paper Clausewitzian Friction and Future War, McNair Papers nr. 68, NDU Press, Institute for National Strategic
Studies, National Defense University, Washington DC, 2004.
conflict, even in the phase previous to military engagement, which is outside a
Clausewitzian conflict.
- on the other hand, the communication theory allows us to see a
significant feature of dissemination, the energy transfer, in psychological terms.
This transfer operates in the volitve domain, and activates the motivation to start
action by the decision based on the intelligence products.
It is clear that the intelligence structures have more «windows» to interact
with the exterior, along the links of the intelligence cycle, as follows:
- Firstly, during the phase of Direction, the intelligence activities are
conducted under the authority of the head of the respective structure. However,
the authority of responsible staffs at different levels is also relevant in the
process, and even the authority of individuals with various responsibilities at
lower echelons of the organization. In the reverse sense, the intelligence
structures report to higher authorities on their activity and make suggestions for
organisation development.
- Secondly, during the Collection phase of the intelligence cycle, the
intelligence structure interacts directly with reality, with the security /
operational environment, from where it obtains the necessary data and
information through activities pertaining to the intelligence collection
disciplines. These interactions are alien to the C2 / decisionmaking system, and
represent, from a systemic point of view, injections of information. These
injections generate intelligence products elaborated according to J2 objectives
and procedures, and destined for the decisionmaking system.
Besides their clandestine nature, the complexity and sensitivity of
intelligence collection activities can be explained by the complications entailed
by the transfer of information between two different systems, one of them, the
operational / security system having a high level of entropy.
Thus, the points of contact with the environment outside the intelligence
structures are shown in the model of the intelligence cycle presented in Figure 1.
They underline the open system characteristic of the intelligence structure,
which has significant implications on the research of the intelligence support.
Higher Authorities
Feed-back
Beneficiaries
Intelligence
Support
Dissemination
Direction
Intelligence
Security
Environment
Collection
Structure
Information
Sources
Analysis
Fig. 1. Communication gates between the intelligence structure and the environment
Practically, J2 and the security environment interact both directly and
through the decisionmaking system of the security macro-system, exchanging
information and energy flows meant to control the Clausewitzian friction in
favour of the party served by the intelligence structure.
3. Intelligence support seen through complexity theory
The open system features allow intelligence activities to be framed in
concepts which reflect open system transfers and provide the opportunity to
study intelligence support using the tools of complexity theory. Recent research
intended to support the intelligence processes with objective parameters
associate security systems to the concept of «complex system», this approach
being operational, in a similar manner, to the security environment, in general.
This kind of systems are called complex systems because "their general
behaviour cannot be limited to a sum of features specific to individual
components"9 of the system. The interction of system components generate
system features which do not reflect features of any individual component, and
the system response to stimuli is not linear. This is simple to verify for the
9
Henrik Jeldtoft Jensen, Foreword to James Moffat, Complexity Theory and Network Centric Warfare, CCRP
Series, Department of Defense, Washington DC, 2004, p. xi - xiii.
international security environment, especially considering the effects of
globalization and the growth in the relevance of non-state actors.
More exactly, the information flows and the capacity to absorb external
shocks define the security environment and the intelligence organization as
complex adaptive systems.
Complex systems are sensitive to perturbations, even limited, cannot be
studied in isolation, ignoring the relationing with the external environment,
show correlations among distant components of the system and can display
adaptation capabilities, the intelligent systems even learning capabilities10. For
example, the terrorist attacks of 11 September 2001 are of utmost importance
mainly by their dovetailed effects than by their immediate impact, because they
triggered a paradigm change in strategic deterrence, a historical transition the
mankind is still living and coping with. Similarly, the colapse of real estate
credits in US revealed malfunctions of the global financial system which led to
the economic-financial crisis triggered last decade, still inflicting the whole
World, and showing only shy signs of departing. The quick action of these
perturbations is facilitated by the specifics of Information Age, is present in
multiple fields, and involve deeply the decision level at national level, as well as
the intergovernmental organizations.
In the military, the Effects Based Operations (EBO) have been dealt
with11 from the following perspectives:
a. Integrated planning strategy, implying speed and continuity;
b. Optimized targeting to serve the intended higher effect;
c. Gaining supremacy (in various domains and engagement spaces) with
speed, to enforce the decisive feature of the effect;
d. Sinergy of power elements in comprehensive approach;
10
James Moffat, Op.cit., Complexity Theory and Network Centric Warfare, pp. 7 - 43.
Joshua Ho, The Advent of A New Way of War: Theory and Practice of Effects-based Operations, Institute for
Defence and Strategic Studies Singapore, December 2003, pp. 9 – 13, accessed at 09.05.2012 at
http://www.rsis.edu.sg/publications/WorkingPapers/WP57.pdf.
11
e. Interaction and cooperation at all levels with all relevant actors, in order
to overcome the uncertainty generated by a complex and adaptive opponent;
f. Utilization of the Network Centric Warfare (NCW) concept, to secure
the operational sinergy in wider and effective format, by exploiting selfsincronization and distribution of capacities.
This approach sees the enemy also as a complex adaptive system and the
conflict as a relation between such systems, acting and adapting to environment
in a non-linear manner, which gives these systems very low predictibility12.
This approach also allows the most important concepts of complexity
theory to be interpreted with significant benefits in terms of intelligence, and,
this way, they contribute to improvements in J2 activity, especially in the
conditions of today's conflicts and NCW requirements.
4. Relevant concepts from complexity theory
The way mathematics can be applied to complex systems has been
examined by James Moffat, who takes into consideration the laws of non-linear
physics, chaos theory, and terms like state of equilibrum, external constraints,
event correlation. Research shows that relation between complexity and the
information-based conflict is less deterministic than the conflict specific to the
Industrial Age, is less driven by physics and more driven by relations. This
underlines the importance of human involvement in security phenomena. Thus,
in the Information Age, command and control highlight the speed of decision
and action, information distribution and decentralization, which are precisely
core features of NCW.
The forecast of future developments in complex system required
analogies with physical, economic or biologic systems, starting with the very
Brownian movement, simple model of random dynamics. In such cases, open
12
Edward A. Smith Jr., Effects Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War,
CCRP Series, Department of Defense, Washington DC, 2002, p. 26.
systems, which respond to external stimuli / constraints with behaviour changes
show dissipative reactions, undergo internal symmetry breakings, can develop
various modes of behaviour to stimuli (including self-organisation), internal
emergent groupings in time and space, as well as corellations among responses
to perturbations13.
In the military, the over-mathematization of security phenomena, for
example, in the case of implementing EBO, raises the danger of blocking the
system and can lead to the colapse of planning by overcoming the analyst
capability to track a large number of variables quickly enough, especially
considering the unpredictibility of human factor. However, in the absence of any
pressure to prematurely implement EBO in real operations, the mathematic
approach maintains its theoretic value and can provide explanations, solutions,
and valuable tools to increase the risk management effectiveness in security
systems or military planning.
The value of mathematic tools in modeling complexity shows in
researches of issues like the (non-linear) behaviour of open systems which can
absorb energy injections, information flows between open systems, as well as
representation, development and use of knowledge. For long term prognosis in
intelligence, the research of knowledge highlights the mechanisms of corellation
identification in high entropy systems, such as the international security
environment. These investigation methods for the future use procedures based
on the patterns identified in the system behaviour, and on the consideration of all
imaginable perturbation factors capable to alter the evolution of reality. A good
example is the shock test applied by NATO researchers during the Multiple
Future Project conducted by the Allied Command Transformation (ACT) to
generate a projection of the Future Security Environment.
13
James Moffat, Op.cit., Complexity Theory and Network Centric Warfare, pp. 3 – 8.
A quick scrutiny of the way the complexity theory concepts match the
international security system should start with the simplest situation, i.e. the
state of normality or, in military terms peacetime.
In complexity theory language, this corresponds to state of equilibrum to
which complex systems tend to evoluate, by their tendency to establish
assymptotically stable rapports. Intelligence serves this trend by its function of
intelligence support, more exactly by the construction of intelligence
superiority14. This functional category of intelligence support allows both the
understanding of evolutions and correlations within the security environment,
and the support for diplomatic options to solve the tense situations of forestall
conflicts before they degenerate. As mentioned before, the efforts to
assymptotically stabilize the security environment are conducted by information
flows and energy flows. Here, the energy transfer side is represented by the
functional category called warning.
The action of intelligence structures occurs inside the cognitive domain of
NCW, and the decisions taken as a result of intelligence support (and other
informational contributions) contain elements called control parameters in the
complexity theory. These parameters define spaces of possbilities for action
(corresponding to courses of action in military planning), and serve to adjust the
security / operational situation variables in order to reach a minimum of the loss
function defined in risk management, i.e. a minimum of the difference between
the real situation and the desired situation.
Looking at the process in the mirror, the intelligence structure tracks the
control parameters used by the adversary, looking to extrapolate their values
when producing prognoses. In the attempt to leave no possibility uncovered, the
intelligence structures group these parameters according to their effects, in sets
of indicators which correspond to thresholds or stages of the courses of action
14
Three functional cathegories have been proposed by Mircea Mocanu in Op.cit. A Novel Vision on the
Intelligence Cycle in the Conditions of the Network Centric Warfare (2013), pp. 109 - 125: construction of
intelligence superiority, warning, and integration into action.
considered as possible to occur. In the complexity theory, these sets of parameters
correspond to the modes of behaviour specific to complex systems. Given that
the security environment and the security systems are subject to human
intervention, their state function is non-linear. Therefore, its representation by an
«objective function» to be optimised by system theory methods is very
complicated and, I dare say, impossible to apply consistently.
5. Functional intelligence issues in complexity theory terms
The adjustments based on intelligence support allow the intelligence
structures to contribute to the realisation of self-organisation as a characteristic of
the emergent complex behaviour of the international security environment.
By Warning, J2 identifies points of criticality which manifest in time and
space within the security environment / operational situation. By the «anomaly
indications» they seek, intelligence analysts identify possible symmetry breakings
as defined in complex systems. For open systems, the energy injections from
outside may act as nonequilibrum constraints which, in security terms, means
political tensions or military threats, when hostile intentions are present.
Criticality points defined in complex systems lead to «turbulences» which
security systems need to absorb by mitigation measures taken in the risk
management activity, the same way, in open complex systems, "the
nonequilibrum enables the system to transform part of the energy communicated
from the environment into an ordered behaviour of a new type: the «dissipative
structure»"15. Obviously, in the case of the security system of any country,
intelligence activity is the first element to contribute to the dissipation of energy
applied from outside by political pressure or military threat. Therefore, risk
management is an activity specific to a «dissipative system». Analysis is
continued in the evaluation of the probable evolution corresponding to the
15
James Moffat, Op/cit. Complexity Theory and Network Centric Warfare, p. 8.
«trajectory of phase space» specific to the adversary's policy, in a historic
perspective, that is prognosed as the dynamics of the most probable actions.
Similarly, the regime / state called «attractor» in complexity theory, can
be associated to the generally characteristic behaviour of a certain international
actor, its trend to pursuit and achieve its national interests, or, for the operational
domain, its specific military doctrine, its traditional way to wage war. Military
intelligence needs to track adversary's actions considering its attractor, yet
always ready to take into account any action apparently opposite to this
attractor, in order to be able to avoid surprise.
Considering the hostile posture manifested by various actors in the
security environment, surprise, as element of the Clausewitzian friction, presents
a special interest from the point of view of complexity theory, because is exactly
the element capable to trigger a decisive evolution for the state of the security
environment. Recent studies pointed out that surprise will remain a factor of
conflict friction in the future because, "if the roots of surprise lie in aspects of
human perceptions and uncertainties too basic for technological advances to
affect, much less eliminate, then it is difficult to see why this source of friction
would diminish in the magnitude of its prospectives effects on future war"16. So,
the complex character of surprise as an element of Clausewitzian friction is
underlined by the intervention of human component, and this becomes the more
unpredictible, the greater the stress of the unexpected situation is. It has been
stated, however, that "surprise is a feature of complexity, not only one of the
uncertainty"17.
The interpretation I suggest for surprise in terms of complexity theory is
based on the ideea that surprise is meant to increase to maximum the
Clausewitzian friction perceived by the adversary, by generating non-linear
evolutions as difficult to control by the surprised party as possible. Simmetry
16
Barry D. Watts, Clausewitzian Friction and Future War, McNair Papers nr. 68, NDU Press, Institute for
National Strategic Studies, National Defense University, Washington DC, 2004, p. 42.
17
Paul Bracken, Op.cit., How to Build ..., în Paul Bracken et.al., Op.cit., Managing Strategic Surprise..., p. 23.
breakings and turbulences in complex adaptive systems are similar to
manoeuvres and rhythm breakings as terms used in tactics or in situations of
political tensions / crises, can generate series of quick cascaded events,
apparently incoherent, which are called clusters in complexity theory. "These
clusters or avalanches of local interaction are constantly being created and
dissolved accross the system"18 by the effect of adaptation, specific to adaptive
complex systems or are absorbed in the process of building an order in
nonequilibrum which corresponds to the measures taken in crisis management.
"Such emergent order rises in open systems where energy and/or information
are allowed to flow accross the boundaries of the system"19.
If, however, these clusters overcome the response capability of an actor or
concatenates overwhelmingly, they generate the psychological effect of a major
surprise, which can impact decisively on the success of the military operation or
of a political confruntation. So, the actions with surprise value overwhelm the
surprised party's capability to control the Clausewitzian chaos of the confruntation.
Therefore, adversary's actions become chaotic, in their turn, with no continuity
with previous actions, no coherence, and failing to cover logical zones, thus
leading to a radical change of the previous situation. In complexity theory, such
low predictibility evolutions are called fractals or fractal evolutions, and
examples of them are from the simplest, like the rise of a grass blade or the
thunder, to the most complicated, like natural cataclisms or historic revolutions.
I propose the association of the concept of surprise, from the military or
security domain, with the concept of fractal / fractal evolution from the complexity
theory, on the ground of the chaotic, unmenageable feature, and of the decisive
nature of surprise events upon the state of the system, at the level such events
occur. The dimensions and gravity of the strategic surprise impact causes the
radical change of the political or operational situation, panic following non18
James Moffat, Adapting Modeling and Simulation for Network Enabled Operations, CCRP Series, Department
of Defense, Washington DC, 2011, p. 26.
19
Idem.
linear evolutions, apparently disproportionate, which break the previous events'
logic. Concrete examples can be the breaking of the front, panicked withdrawal,
the loss of troop control, leading to capitulation - in the military domain - or the
dissolution of central institutions, anarchy, fall of the government, monarch's
abdication or president's resignation, or the loss of national sovreignty - in the
political realm.
Aiming to control the Clausewitzian friction, intelligence support
significantly contributes to the efforts to control the complexity of the security /
operational environment. This action is conducted along the lines of the three
functional cathegories proposed for the intelligence support to decisionmaking:
- firstly, during the periods of low Clausewitzian friction, corresponding
to the state of normality of the complex adaptive system, intelligence
support contributes to bulding informational dominance by the
functional category I termed construction of intelligence superiority.
Thus, intelligence structures contribute to situation awareness and to
secure the base for security system's option to generate, when necessary,
turbulences or clusters opposing adversay's interests, or even decisive
fractal evolutions to surprise the adversary in order to bend his will;
- then, as the Clausewitzian friction increases, when a threat is identified
or a risk escalates, intelligence support assures avoiding surprise by the
functional category called warning. Practically, the intelligence structure
contributes to own security system protection by diminishing or
eliminating the possibility that the system be subject to turbulences or
fractal evolutions which might overcome system's control capcitity.
Also by warning, the intelligence structures identify vulnerabilities of
the opponent and favourable conditions able to be exploited in a certain
situation as opportunities for decisions aiming to surprise the adversary
by planning turbulences or events which can trigger fractals beyond
adversary's capabilities to control;
- thirdly, during maximum Clausewitzian friction periods, for example
during major international political crises or armed conflicts, the
intelligence structures, operating closely or even integrated with the other
operational planners in C2, deliver at high pace products containing
«actionable» intelligence. Such valuable contents integrates immediately
into action to contribute to the control of the turbulences or fractal
evolutions that the own system faces. This way, intelligence contributes
to the construction of an order in non-equilibrum, i.e. to crisis
management, respectively to operational planning and military action.
Conclusions
Following the interpretation of intelligence role in the transfer of
Clausewitzian friction to the adversary and the argumentation for the open
system feature of the intelligence structures, the research into complexity theory
allows rephrasing intelligence role using today's thoretical concepts of wide
generality.
The natural interpretation of the complexity theory concepts in terms of
intelligence activities facilitates the development of theoretic constructions and
conceptual progresses useful for improving the crisis management efforts or
intelligence support for military decision.
Therefore, the research of intelligence domain through complexity theory
eyes is worth to be followed by the the study and interpretation of C2 / crisis
management / operational planning from the same scientific prespective.
Bibliography
* * * www.weforum.org/reports for the World Economic Forum reports: Global
Risks Report 2011, Global Risks Report 2012, Global Risks Report 2013
and Global Risks Report 2014.
BRACKEN, Paul; BREMMER, Ian şi GORDON, David, Managing Strategic
Surprise. Lessons from Risk Management and Risk Assessment,
Cambridge University Press, Cambridge, UK, 2008.
HO, Joshua, The Advent of A New Way of War: Theory and Practice of Effectsbased Operations, Institute for Defence and Strategic Studies Singapore,
december
2003,
published
at
http://www.rsis.edu.sg/publications/WorkingPapers/WP57.pdf.
KUGLER, Richard L. and FROST, Ellen L. (coord.), The Global Century:
Globalization and National Security, Institute for National Strategic
Studies / National Defense University, Washington, DC, 2001.
MOCANU, Mircea, A Novel Vision on the Intelligence Cycle in the Conditions
of the Network Centric Warfare, PhD thesis defended at National
Defence University "Carol I", Bucharest, July 6, 2013.
MOCANU, Mircea, Military Intelligence as Open System, presented at the
interntional scientific conference Strategies XXI: "The Complexity and
Dynamism of the Security Environment", Centre for Strategic, Defence
and Security Studies, National Defence University Publishing House,
Bucharest, November 21-22, 2013, vol II, pp. 276 - 285.
MOCANU, Mircea and BOTOŞ, Ilie, PhD, Long Term Analysis and the Multiple
Future Concept, presented at "Power Balance and Security Environment"
conference, Centre for Strategic, Defence and Security Studies, National
Defence University Publishing House, Bucharest, November 17-18, 2011,
vol II, pp. 33 - 46.
MOFFAT, James, Adapting Modeling and Simulation for Network Enabled
Operations, CCRP Series, Department of Defense, Washington, 2011.
MOFFAT, James, Complexity Theory and Network Centric Warfare, CCRP
Series, Department of Defense, Washington DC, 2004.
SMITH Jr., Edward A., Effects Based Operations: Applying Network Centric
Warfare in Peace, Crisis, and War, CCRP Series, Department of
Defense, Washington DC, 2002.
WATTS, Barry D., Clausewitzian Friction and Future War, McNair Papers nr.
68, NDU Press, Institute for National Strategic Studies, National
Defense University, Washington DC, 2004.